CVE-2014-8799 Scanner

Detects 'Directory Traversal' vulnerability in DukaPress plugin for Wordpress affects v. before 2.5.4.

Short Info


Level

Medium

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

1 month 2 days

Scan only one

URL

Toolbox

-

The DukaPress plugin is an e-commerce solution for WordPress that enables users to easily sell products and services on their websites. With DukaPress, users can create product pages, manage orders, and process payments seamlessly. However, a vulnerability in version 2.5.4 and below of DukaPress has been discovered that can compromise the security of websites using this plugin.

The vulnerability, with the code CVE-2014-8799, is a directory traversal bug found in the dp_img_resize function in php/dp-functions.php. This bug allows attackers to read arbitrary files through a ".." in the 'src' parameter to lib/dp_image.php. In other words, this vulnerability enables attackers to access sensitive files and data on the targeted website.

When exploited, this vulnerability can result in attackers gaining access to sensitive files such as password files, configuration files, and other sensitive data that can lead to a complete website takeover. This vulnerability can also lead to unauthorized access to customer information, which can result in a data breach.

In conclusion, it is essential to stay informed about vulnerabilities in digital assets, such as websites. With the pro features of the s4e.io platform, it is easy to quickly learn about vulnerabilities and take action to protect your online assets. Stay vigilant and take proactive measures to protect your website from malicious attacks.

 

REFERENCES

Get started to protecting your Free Full Security Scan